CVE-2022-0639
JavaScript vulnerability analysis and mitigation

Overview

CVE-2022-0639 is an Authorization Bypass vulnerability affecting NPM url-parse versions prior to 1.5.7. The vulnerability was disclosed on February 17, 2022. The issue stems from incorrect conversion of @ characters in protocol in the href field, which can lead to failure to properly identify the hostname (NVD, Ubuntu).

Technical details

The vulnerability has a CVSS 3.1 base score of 5.3 (Medium), with the following characteristics: Network attack vector, Low attack complexity, No privileges required, No user interaction needed, Unchanged scope, No impact on confidentiality, Low impact on integrity, and No impact on availability. The vulnerability exists in the URL parsing mechanism where incorrect handling of the @ character in the protocol section of URLs can lead to authorization bypass (Ubuntu).

Impact

The primary impact of this vulnerability is the potential for authorization bypass through user-controlled keys. When exploited, the vulnerability could allow attackers to bypass security controls that rely on proper URL parsing and hostname identification (Debian, Red Hat).

Mitigation and workarounds

The vulnerability has been fixed in url-parse version 1.5.7 and later. Various Linux distributions have released security updates to address this vulnerability: Ubuntu has fixed versions for multiple releases including 20.04 LTS (1.4.7-3ubuntu0.1), 18.04 LTS (1.2.0-1ubuntu0.1), and 16.04 LTS (1.0.5-2ubuntu0.1~esm2). Debian has also provided fixes in their repositories (Ubuntu, Debian).

Additional resources


SourceThis report was generated using AI

Related JavaScript vulnerabilities:

CVE ID

Severity

Score

Technologies

Component name

CISA KEV exploit

Has fix

Published date

CVE-2025-67731HIGH8.7
  • JavaScriptJavaScript
  • servify-express
NoYesDec 12, 2025
CVE-2025-67718HIGH8.7
  • JavaScriptJavaScript
  • formio
NoYesDec 11, 2025
CVE-2025-65513HIGH7.5
  • JavaScriptJavaScript
  • mcp-fetch-server
NoNoDec 09, 2025
CVE-2025-67716MEDIUM5.7
  • JavaScriptJavaScript
  • @auth0/nextjs-auth0
NoYesDec 11, 2025
CVE-2025-67490MEDIUM5.4
  • JavaScriptJavaScript
  • @auth0/nextjs-auth0
NoYesDec 10, 2025

Free Vulnerability Assessment

Benchmark your Cloud Security Posture

Evaluate your cloud security practices across 9 security domains to benchmark your risk level and identify gaps in your defenses.

Request assessment

Get a personalized demo

Ready to see Wiz in action?

"Best User Experience I have ever seen, provides full visibility to cloud workloads."
David EstlickCISO
"Wiz provides a single pane of glass to see what is going on in our cloud environments."
Adam FletcherChief Security Officer
"We know that if Wiz identifies something as critical, it actually is."
Greg PoniatowskiHead of Threat and Vulnerability Management